The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accurate, real time identification of P2P traffic is especially important for network management, because they seriously affect QoS of normal network services. In this paper, we propose an omnibus approach to identify Bit Torrent (BT) traffic in real time. We apply application signatures to identify unencrypted traffic. And for those encrypted BT traffic, we propose a message stream model according...
To organize the distributed computing system resources to form the level structure to carry on the management provides the basis for the computation task assignment and the dispatch resources. According to the characteristic of the arrangement matching recursion, based on the sole data inserting in the cru-node, one method of sub-tree to be formed one pile is proposed, one algorithm of sub-tree heap...
This work presents a special class of a data flow oriented optimization tool that finds the optimal number of threads for multi-thread software. Threads are assumed to encapsulate concurrent executable key functionalities, are connected through finite capacity queues, and require certain hardware resources. We show how a combination of measurement and calculation, based on Queueing Theory, leads to...
The rapid development of wireless technology, the extensive use of mobile phones and the availability of location information are facilitating personalized location-based applications. Easy to carry, easy to use and easy to buy, smart phones with certain software are of great advantage. Consequently, mobile social networking (MSN) systems have emerged rapidly, being a revolution for our everyday life...
The content dissemination among mobile users can be solved by self-facilitated mobile ad hoc networks (MANET) in an infrastructure environment. But the devices used to make up the mobile ad hoc networks usually have a limited radio transmission range, sporadic node density and power limitation, which makes MANET become intermittently connected. In this paper we focus on the content delivery problem...
As the proportion of video programs is expected to grow significantly, video services will require a huge amount of Internet bandwidth in the future. In this paper, we model the video program placement (VPP) problem in tree networks which sends video programs to the requesting (demand) nodes using a broadcast method. The model considers the cost for both assigning programs to nodes and broadcasting...
Peer-to-Peer technology is one of the most popular techniques nowadays, and it brings some security issues, so the recognition and management of P2P applications on the internet is becoming much more important. The selection of protocol attributes is significant to the problem of P2P identification. To overcome the shortcomings of current methods, a new P2P identification algorithm based on genetic...
By taking into account communication startup overhead and the assigned processor distribution order and by applying hashing technique, a novel sequence distribution strategy is presented and the parallel local alignment algorithm for multiple sequences is designed on the heterogeneous cluster system that the computing nodes have different computing speeds and communication capabilities based on divisible...
FFT is a widely used algorithm, of which parallelization is a very important topic. There were a lot of works for this field and many parallel algorithms were published in several decades. In this paper, an algorithm named Computation Oriented Parallel FFT (COPF) is proposed. COPF which dates from the classic parallel radix-2 FFT focuses on the butterfly structure in FFT and adopts a proper strategy...
The idea of controlling and synchronizing chaotic systems refers to a process where in two or many chaotic systems starting from different initial conditions adjust a given property of their motion to a common behaviors. In this paper, the stable tracking control of continuous chaotic systems are studied and a new control method is proposed. Based on Lyapunov stability theory, an adaptive controller...
Parallel program performance analysis plays an important role in exploring parallelism and improving efficiency of parallel programs. A remote interactive parallel program performance analysis tool based on dynamic code instrumentation is designed on the basis of analysis and comparison of existing program performance analysis tools. A hierarchical structure is adopted by this tool which consists...
Behavior adaptation of Software component is a crucial problem in component-based software engineering. A general approach is proposed to solve the behavior mismatch. Firstly, the synchronous vector between component behaviors according to the abstract specification of component behavior is calculated, and the specification of the adaptor is given. Then, in order to detect automatically deadlock mismatch,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.